HUD OCIO should develop and implement processes to monitor and analyze qualitative and quantitative performance measures for the effectiveness of its ISCM program (IG FISMA metric 47).
2023-OE-0001 | January 29, 2024
HUD FY 2023 Federal Information Security Modernization Act (FISMA) Evaluation Report
Chief Information Officer
- Status2023-OE-0001-21OpenClosed
- Status2023-OE-0001-22OpenClosed
HUD OCIO should define a process and assign responsibility to evaluate the effectiveness of its incident response technologies and adjust configurations and toolsets to improve the incident response program (IG FISMA metric 58).
- Status2023-OE-0001-23OpenClosed
HUD OCIO should update its enterprisewide business impact prioritization analysis procedures to include system dependencies and the characterization of system components (IG FISMA metric 61).
2022-OE-0008 | January 19, 2024
U.S. Department of Housing and Urban Development Employee Retention
Office of Chief Human Capital Officer
- Status2022-OE-0008-01OpenClosed
Implement a transparent process for reviewing open-ended exit survey results and sharing those results with ODEEO, as appropriate, and program offices while still protecting former employees’ confidentiality.
- Status2022-OE-0008-02OpenClosed
Assess what departing employees mean when they indicate that organizational culture is a motivation for leaving HUD.
- Status2022-OE-0008-03OpenClosed
Develop guidance for the program offices to identify the causes behind high attrition rates in governmentwide high-risk MCOs and field offices in large cities.
- Status2022-OE-0008-04OpenClosed
Develop guidance for program offices to develop program office-specific action plans to address any causes found for high attrition rates in governmentwide high-risk MCOs and field offices in large cities.
- Status2022-OE-0008-05OpenClosed
Create a single, unified agency-specific MCO list updated to reflect current progress toward closing skills gaps.
2023-OE-0001a | December 20, 2023
Fiscal Year 2023 Federal Information Security Modernization Act of 2014 Penetration Test Evaluation Report
Policy Development & Research
- Status2023-OE-0001a-04OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
Chief Information Officer
- Status2023-OE-0001a-01OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2023-OE-0001a-02OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2023-OE-0001a-03OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2023-OE-0001a-05OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2023-OE-0001a-06OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
2021-OE-0010 | March 10, 2023
The Office of Community Planning and Development’s Use of Remote Monitoring
Community Planning and Development
- Status2021-OE-0010-01OpenClosed
Complete and update the system security plans for GMP and DRGR and issue an SSN justification memorandum.
- Status2021-OE-0010-02OpenClosed
Identify and provide additional role-based training, guidance, and instructions to CPD employees on how to appropriately handle and safeguard PII encountered during monitoring.
- Status2021-OE-0010-03OpenClosed
Reinforce the use and admissibility of photographs and videos for evidence collection while remote monitoring.
- Status2021-OE-0010-04OpenClosed
Identify strategic opportunities to use remote monitoring early in the FY to maximize its responsibility to oversee and monitor its grantees and then use remote monitoring when those opportunities arise.
2021-OE-0011b | February 28, 2023
Improvements are Needed to the U.S. Department of Housing and Urban Development's Processes for Monitoring Elevated Blood Lead Levels and Lead-Based Paint Hazards in Public Housing
Public and Indian Housing
- Status2021-OE-0011b-02OpenClosed
Create a plan and timeline that outlines OFO’s proposal to make necessary improvements to the EBLL tracker, such as moving it to a different platform.
- Status2021-OE-0011b-03OpenClosed
Provide field office staff access to historical data in the EBLL tracker to be readily available as needed, with adequate protection of PII.